33 lines
1.2 KiB
YAML
33 lines
1.2 KiB
YAML
# Orders controller role
|
||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
||
kind: ClusterRole
|
||
metadata:
|
||
name: cert-manager-controller-orders
|
||
labels:
|
||
app: cert-manager
|
||
app.kubernetes.io/name: cert-manager
|
||
app.kubernetes.io/instance: cert-manager
|
||
app.kubernetes.io/managed-by: Tiller
|
||
helm.sh/chart: cert-manager-v0.9.0
|
||
rules:
|
||
- apiGroups: ["certmanager.k8s.io"]
|
||
resources: ["orders", "orders/status"]
|
||
verbs: ["update"]
|
||
- apiGroups: ["certmanager.k8s.io"]
|
||
resources: ["orders", "clusterissuers", "issuers", "challenges"]
|
||
verbs: ["get", "list", "watch"]
|
||
- apiGroups: ["certmanager.k8s.io"]
|
||
resources: ["challenges"]
|
||
verbs: ["create", "delete"]
|
||
# We require these rules to support users with the OwnerReferencesPermissionEnforcement
|
||
# admission controller enabled:
|
||
# https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#ownerreferencespermissionenforcement
|
||
- apiGroups: ["certmanager.k8s.io"]
|
||
resources: ["orders/finalizers"]
|
||
verbs: ["update"]
|
||
- apiGroups: [""]
|
||
resources: ["secrets"]
|
||
verbs: ["get", "list", "watch"]
|
||
- apiGroups: [""]
|
||
resources: ["events"]
|
||
verbs: ["create", "patch"]
|